Duqu targeted each victim with unique files and servers
Well-financed developers had sense of humor
The creators of the Duqu malware that penetrated industrial manufacturers in at least eight countries tailored each attack with exploit files, control servers, and booby-trapped Microsoft Word documents that were different for each victim, according to research published on Friday.
What's more, two of the drivers the sophisticated, highly modular rootkit used in one attack showed compilation dates of 2007 and 2008, Alexander Gostev, the Kaspersky Lab expert and author of the report said. If the dates are genuine, they suggest the Duqu architects may have spent the past four years developing the malware.
Like forensics investigators combing through a homicide scene for the tiniest scraps of evidence, security researchers around the world are examining every email and computer file associated with Duqu for clues about who created and and for what purpose. They have yet to establish a direct link to the Stuxnet worm that was unleashed to sabotage uranium-enrichment plants in Iran, but the aggregate picture of Duqu that's emerging is that like Stuxnet, it was painstakingly developed by a world-class team of disciplined and well-financed engineers.
The Duqu version examined in Friday's report was recovered by the Sudan Computer Emergency Response Team from an undisclosed company that the attackers targeted in advance. Like attacks on other targets, it was launched using a booby-trapped Word document with content that was tailored to the receiving organization and exploited a previously unknown vulnerability in the kernel of all supported versions of Microsoft Windows.
The first attempt at infection in the incident studied by Kaspersky failed because the email containing the Word document wound up in a spam folder. On May 21, four days after the first email was sent, the attackers tried again with a slightly modified message. Both the subject line and the title of the attached file referenced the targeted company specifically. Interestingly, the DLL file that served as the trojan's main module was dated April 17, the same day as the first attempt to infect the target.
When the recipient of the second email opened the Word document, a malicious payload immediately hijacked the computer, but sat dormant for about 10 minutes, Gostev said. The exploit didn't actually install the spy components until the end user went idle. The infected computer used a command and control server researchers have never seen before. So far, investigators have identified at least four such servers, and each one was used to send and receive data from only one target.
In late May, a second computer in the attack examined by Kaspersky was infected over the targeted company's local network. Gostev didn't say how the Duqu infection was able to spread. Separate research from Symantec has suggested the malware is was able to spread across networks through SMB connections used to share files from machine to machine.
For all the skill and care the attackers took, they also showed an intriguing sense of humor. The malicious shellcode for their exploit was embedded in a fictitious font called “Dexter Regular,” and contained the line “Copyright (c) 2003 Showtime Inc.” The hidden message is an obvious reference to the Dexter television series, which depicts a ritualistic serial killer who works as a crime-scene investigator for the Miami Police Department.
“This is another prank pulled by the Duqu authors,” Gostev wrote. ®
- Black Hat
- Common Vulnerability Scoring System
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Data Breach
- Data Protection
- Data Theft
- Digital certificate
- Identity Theft
- Kenna Security
- Palo Alto Networks
- Trusted Platform Module
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows XP
- Zero trust